全文获取类型
收费全文 | 876篇 |
免费 | 82篇 |
国内免费 | 70篇 |
专业分类
电工技术 | 34篇 |
综合类 | 123篇 |
化学工业 | 11篇 |
金属工艺 | 15篇 |
机械仪表 | 30篇 |
建筑科学 | 67篇 |
矿业工程 | 48篇 |
能源动力 | 17篇 |
轻工业 | 6篇 |
水利工程 | 46篇 |
石油天然气 | 19篇 |
武器工业 | 6篇 |
无线电 | 83篇 |
一般工业技术 | 41篇 |
冶金工业 | 37篇 |
原子能技术 | 4篇 |
自动化技术 | 441篇 |
出版年
2024年 | 10篇 |
2023年 | 7篇 |
2022年 | 19篇 |
2021年 | 19篇 |
2020年 | 29篇 |
2019年 | 21篇 |
2018年 | 18篇 |
2017年 | 14篇 |
2016年 | 14篇 |
2015年 | 26篇 |
2014年 | 49篇 |
2013年 | 28篇 |
2012年 | 41篇 |
2011年 | 54篇 |
2010年 | 53篇 |
2009年 | 55篇 |
2008年 | 67篇 |
2007年 | 55篇 |
2006年 | 48篇 |
2005年 | 52篇 |
2004年 | 39篇 |
2003年 | 48篇 |
2002年 | 42篇 |
2001年 | 34篇 |
2000年 | 26篇 |
1999年 | 23篇 |
1998年 | 19篇 |
1997年 | 30篇 |
1996年 | 18篇 |
1995年 | 15篇 |
1994年 | 5篇 |
1993年 | 10篇 |
1992年 | 4篇 |
1991年 | 7篇 |
1990年 | 8篇 |
1989年 | 2篇 |
1988年 | 6篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 2篇 |
1981年 | 2篇 |
1980年 | 1篇 |
1974年 | 1篇 |
1965年 | 1篇 |
1963年 | 1篇 |
排序方式: 共有1028条查询结果,搜索用时 31 毫秒
941.
942.
943.
Leslie Lamport 《Distributed Computing》1990,4(2):59-68
Reasoning about a distributed algorithm is simplified if we can ignore the time needed to send and deliver messages and can instead pretend that a process sends a collection of messages as a single atomic action, with the messages delivered instantaneously as part of the action. A theorem is derived that proves the validity of such reasoning for a large class of algorithms. It generalizes and corrects a well-known folk theorem about when an operation in a multiprocess program can be considered atomic.List of notations
A
The set of program actions
-
A
The algorithm under consideration
-
A
The reduced version of algorithmA
- A
The action obtained by executing the operationA as an atomic action
-
C
The set of state components
-
d[i]
A variable of the Distance-Finding Algorithm
-
L
An operation ofA, as in C2
-
The operation obtained by adding toL the actions that deliver messages sent byL
-
N
p(S)
The set of possible next actions of processp from states
-
P
The correctness property
-
R
An operation ofA, as in C2
-
S
The set of states
-
S
0
The set of initial states
-
S
c
The range of values of state componentc
- X
An action ofA, as in C2
-
Usually denotes an execution ofA
-
The execution ofA that corresponds to an execution ofA
When snow conditions are poor,Dr. L. Lamport works at Digital Equipment Corporation's Systems Research Center. As an undergraduate, he took a course in atomic physics. 相似文献
944.
Mohammad R. Hajihashemi Magda El-ShenaweeAuthor Vitae 《Journal of Parallel and Distributed Computing》2010
A parallelized version of the level-set algorithm based on the MPI technique is presented. TM-polarized plane waves are used to illuminate two-dimensional perfect electric conducting targets. A variety of performance measures such as the efficiency, the load balance, the weak scaling, and the communication/computation times are discussed. For electromagnetic inverse scattering problems, retrieving the target’s arbitrary shape and location in real time is considered as a main goal, even as a trade-off with algorithm efficiency. For the three cases considered here, a maximum speedup of 53X-84X is achieved when using 256 processors. However, the overall efficiency of the parallelized level-set algorithm is 21%–33% when using 256 processors and 26%–52% when using 128 processors. The effects of the bottlenecks of the level-set algorithm on the algorithm efficiency are discussed. 相似文献
945.
林东冒沙煤矿4842工作面回采遇断层时,须将工作面设备及支架搬到下段,需重新开切眼,采用中间分合式撤面安装工艺,仅用14 d时间就回撤安装完毕,工作面通过断层. 相似文献
946.
Miklós Erdélyi-Szabó László Kálmán Agi Kurucz 《Journal of Logic, Language and Information》2008,17(1):1-17
The paper sets out to offer an alternative to the function/argument approach to the most essential aspects of natural language
meanings. That is, we question the assumption that semantic completeness (of, e.g., propositions) or incompleteness (of, e.g.,
predicates) exactly replicate the corresponding grammatical concepts (of, e.g., sentences and verbs, respectively). We argue
that even if one gives up this assumption, it is still possible to keep the compositionality of the semantic interpretation
of simple predicate/argument structures. In our opinion, compositionality presupposes that we are able to compare arbitrary
meanings in term of information content. This is why our proposal relies on an ‘intrinsically’ type free algebraic semantic
theory. The basic entities in our models are neither individuals, nor eventualities, nor their properties, but ‘pieces of
evidence’ for believing in the ‘truth’ or ‘existence’ or ‘identity’ of any kind of phenomenon. Our formal language contains
a single binary non-associative constructor used for creating structured complex terms representing arbitrary phenomena. We
give a finite Hilbert-style axiomatisation and a decision algorithm for the entailment problem of the suggested system. 相似文献
947.
This paper defines a type of constrained artificial neural network (ANN) that enables analytical certification arguments whilst retaining valuable performance characteristics. Previous work has defined a safety lifecycle for ANNs without detailing a specific neural model. Building on this previous work, the underpinning of the devised model is based upon an existing neuro-fuzzy system called the fuzzy self-organising map (FSOM). The FSOM is type of ‘hybrid’ ANN which allows behaviour to be described qualitatively and quantitatively using meaningful expressions. Safety of the FSOM is argued through adherence to safety requirements—derived from hazard analysis and expressed using safety constraints. The approach enables the construction of compelling (product-based) arguments for mitigation of potential failure modes associated with the FSOM. The constrained FSOM has been termed a ‘safety critical artificial neural network’ (SCANN). The SCANN can be used for non-linear function approximation and allows certified learning and generalisation for high criticality roles. A discussion of benefits for real-world applications is also presented. 相似文献
948.
J. Miguel-Alonso J. Navaridas F. J. Ridruejo 《International journal of parallel programming》2009,37(2):153-174
This paper addresses the utilization of traces taken from MPI applications to do simulation-based performance studies of parallel
computing systems. Different mechanisms to capture traces are discussed, pointing out important limitations of some of them.
One of these limitations is the invisibility of message interchanges in collective operations, which is circumvented modifying
a trace-capturing library. During a simulation, trace records must be simulated in causal order, to fully comply with application
semantics. Alternatives to follow this order, and the risks of not following it, are presented and discussed. The techniques
introduced in this paper have been implemented in an in-house developed simulation environment, which is used in two example
studies to show its usefulness: an evaluation of alternatives for interconnection network design, and a performance prediction
study in which traces from one machine are used to estimate the execution times of applications running in a different machine. 相似文献
949.
James S. Sims John G. Hagedorn Peter M. Ketcham Steven G. Satterfield Terence J. Griffin William L. George Howland A. Fowler Barbara A. am Ende Howard K. Hung Robert B. Bohn John E. Koontz Nicos S. Martys Charles E. Bouldin James A. Warren David L. Feder Charles W. Clark B. James Filla Judith E. Devaney 《Journal of research of the National Institute of Standards and Technology》2000,105(6):875-894
The rate of scientific discovery can be accelerated through computation and visualization. This acceleration results from the synergy of expertise, computing tools, and hardware for enabling high-performance computation, information science, and visualization that is provided by a team of computation and visualization scientists collaborating in a peer-to-peer effort with the research scientists.In the context of this discussion, high performance refers to capabilities beyond the current state of the art in desktop computing. To be effective in this arena, a team comprising a critical mass of talent, parallel computing techniques, visualization algorithms, advanced visualization hardware, and a recurring investment is required to stay beyond the desktop capabilities.This article describes, through examples, how the Scientific Applications and Visualization Group (SAVG) at NIST has utilized high performance parallel computing and visualization to accelerate condensate modeling, (2) fluid flow in porous materials and in other complex geometries, (3) flows in suspensions, (4) x-ray absorption, (5) dielectric breakdown modeling, and (6) dendritic growth in alloys. 相似文献
950.
油井深抽过泵产液剖面测试技术 总被引:1,自引:0,他引:1
为准确找出油井的出水层段,研究了深抽过泵产液剖面测试技术。该工艺技术在油井检泵作业施工期间.进行,在井下2000m以内套管上悬挂空心测试抽汲泵,通过油管驱动深抽产液,测试仪器从油管下入并过泵柱塞到达测试层段,进行不停抽测试,得到产液剖面资料,判断出主产水层,进行有针对性的卡堵水作业。适用于斜井、稠油井、螺杆泵井、电潜泵井、水力泵井等无法进行环空测试的油井。在华北油田成功实施了50余井次,为油田开发方案的判定提供了较为准确的资料。 相似文献